Skip to main content

Self-Sovereign Identity

Self-Sovereign Identity (SSI) is the foundational principle behind Hadinet Africa's identity model. It means that you own and control your digital identity — not a government, not a corporation, not a platform.

What is Self-Sovereign Identity?

In traditional identity systems, your identity is issued and controlled by a central authority. A government issues your passport. A bank verifies your address. A social media platform holds your profile. In each case, the authority can revoke, modify, or expose your identity without your consent.

Self-sovereign identity reverses this relationship:

  • You create your identity by connecting a wallet
  • You control your identity through your private key
  • You choose what to share through selective disclosure
  • No one can revoke it — your on-chain proof is permanent and tamper-proof

How SSI Works in Hadinet

Wallet-Based Identity

Your identity in Hadinet is derived entirely from your crypto wallet. There is no registration form, no username, no password, and no email required. When you connect a wallet, your identity is created automatically.

The process:

  1. You connect your wallet (MetaMask, WalletConnect, email, or social login)
  2. You sign a message to prove ownership of the wallet
  3. A DID (Decentralized Identifier) is derived from your wallet's public key
  4. This DID becomes your pseudonymous identity across the entire Hadinet ecosystem

The DID Model

A DID (Decentralized Identifier) is a globally unique identifier that you control. In Hadinet, it is derived deterministically from your wallet:

Wallet (secp256k1 private key)
-> Public key (33 bytes, compressed)
-> Multicodec prefix (0xe7 0x01)
-> Base58btc encoding
-> did:key:zQ3sh...

Key properties of your DID:

PropertyDetail
DeterministicThe same wallet always produces the same DID
PseudonymousThe DID cannot be traced back to your real identity
Self-issuedNo registration or approval from any authority
PersistentYour DID exists as long as your wallet exists
PortableWorks across any service that supports the did:key method

No Registration Required

Unlike traditional identity systems, Hadinet does not require:

  • Email address
  • Phone number
  • Username or password
  • Government-issued ID (until you choose to verify)
  • Any personal information whatsoever

Connecting a wallet is sufficient to establish your identity. Verification (KYC) is an optional step that adds a cryptographic proof to your DID.

The SSI Trust Triangle

In the SSI model, there are three roles:

RoleWhoWhat They Do
IssuerKYC Provider (Smile ID, Plaid)Verifies your identity and issues a credential
HolderYou (your wallet)Holds the credential and chooses when to present it
VerifierAny serviceChecks your credential without contacting the issuer

In Hadinet, this triangle works as follows:

  1. The KYC provider verifies your identity using your documents
  2. The attestor generates a ZK proof of that verification
  3. You hold the proof on-chain, tied to your wallet
  4. Any service can verify your proof independently — without contacting the KYC provider or Hadinet

Why SSI Matters for Africa

Africa's identity challenge is unique:

  • 500+ million people lack formal identification
  • 54 countries with different identity systems and no interoperability
  • Cross-border movement requires repeated, invasive verification
  • Data breaches in centralized databases disproportionately harm vulnerable populations

SSI addresses these challenges by:

  • Letting individuals create their own identity without relying on a single government system
  • Making identity portable across borders through standardized DIDs
  • Eliminating centralized databases that become breach targets
  • Giving individuals control over who sees their verification status

Comparison: Traditional vs. Self-Sovereign

AspectTraditional IdentitySelf-Sovereign Identity
Created byCentral authorityYou (your wallet)
Controlled byIssuing authorityYou (your private key)
Stored inCentralized databaseBlockchain (your wallet)
Can be revokedYes, by the authorityNo — permanent on-chain
Data exposureFull PII to every verifierZero-knowledge proof only
Cross-borderRequires re-verificationOne proof, everywhere
Breach riskHigh (centralized target)None (no PII stored)

Next Steps